Menu

The Industrial Internet of Things FEATURE NEWS

IIC Releases Endpoint Security Best Practices

By Chrissie Cluney March 27, 2018

Are you and your company interested in learning more about the IIoT to better your company’s productivity?

The Industrial Internet Consortium (IIC), the world’s leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT), announced the publication of the “Endpoint Security Best Practices” white paper.

This report is a concise document that equipment manufacturers, critical infrastructure operators, integrators and others can utilize to implement the counter-measures and controls that they need to ensure the safety, security and reliability of IoT endpoint devices. These devices include edge devices such as sensors, actuators, pumps, flow meters, controllers and drives in industrial systems. They also include embedded medical devices, electronic control units vehicle controls systems, as well as communications infrastructure and gateways.

“The number of attacks on industrial endpoints has grown rapidly in the last few years and has severe effects. Unreliable equipment can cause safety problems, customer dissatisfaction, liability and reduced profits,” said Steve Hanna, IIC white paper co-author, and senior principal, Infineon Technologies. “The Endpoint Security Best Practices white paper moves beyond general guidelines, providing specific recommendations by security level. Thus, equipment manufacturers, owners, operators and integrators are educated on how to apply existing best practices to achieve the needed security levels for their endpoints.”

The paper discusses one of the six functional building blocks from the IIC Industrial Internet Security Framework (IISF), which is the Endpoint Protection. The 13-page white paper describes the key information about endpoint device security from industrial guidance and compliance frameworks. These include IEC 62443, NIST SP 800-53 and the IIC IISF.

Who is the paper geared to? Equipment manufacturers, industrial operators and integrators can use the Endpoint Security Best Practices report to understand how countermeasures or controls can be applied to achieve a particular security level such as basic, enhanced, or critical when building or upgrading industrial IoT endpoint systems.

These professionals can determine this through risk modeling and threat analysis.

“By describing best practices for implementing industrial security that are appropriate for agreed-upon security levels, we’re empowering industrial ecosystem participants to define and request the security they need,” said Dean Weber, IIC white paper co-author and CTO, Mocana. “Integrators can build systems that meet customer security needs and equipment manufacturers can build products that provide necessary security features efficiently.”

The IIC is working to educate the industrial workforce to better the understanding of what the IIoT is.




Edited by Maurice Nagle
SHARE THIS ARTICLE
Related Articles

Wind Power: Wind River Empowers Developers with Enhanced Studio Capabilities for Mission Critical Intelligent Systems

By: Arti Loftus    4/16/2021

This month Wind RIver rolled out enhancements to what they describe as a pre-integrated, cloud-scale DevSecOps environment where developers can build,…

Read More

Industry Strength Security for the Industrial IoT: The Need for Speed, Safety, and Scale

By: Arti Loftus    4/15/2021

The Industrial Internet of Things (IIoT) is growing in size, sophistication, and sustainability, as billions of dollars of investment, are paying off …

Read More

Financing the Future of Sustainable Energy: Innovative Financing for Innovative Technologies

By: Arti Loftus    4/13/2021

AI using IoT sensors is becoming vital to control the costs and improve the quality of maintenance and field service across energy infrastructure, inc…

Read More

For Connected Industrial Systems, Cloud Governance and Data Management is Mission Critical

By: Arti Loftus    4/12/2021

Distributed industrial systems, edge data, sensors, and computing, and shipping data to the cloud or multiple clouds for analytics and other purposes …

Read More

As Infrastructure Spending is Anticipated to Grow, Controlling Engineering and Construction Costs is Mission Critical

By: Andrew Athanasian    4/7/2021

With a newfound interest in infrastructure investment and the introduction of a multi-trillion-dollar infrastructure bill by the current Administratio…

Read More